Skill4Agent
Skill4Agent
All SkillsSearchTools
|
Explore
Skill4Agent
Skill4Agent

AI Agent Skills Directory with categorization, English/Chinese translation, and script security checks.

Sitemap

  • Home
  • All Skills
  • Search
  • Tools

About

  • About Us
  • Disclaimer
  • Copyright

Help

  • FAQ
  • Privacy
  • Terms
Contact Us:osulivan147@qq.com

© 2026 Skill4Agent. All rights reserved.

All Skills

Total 43,555 skills, Security & Compliance has 1629 skills

Categories

Showing 12 of 1629 skills

Per page
Downloads
Sort
Security & Compliancelawvable/awesome-legal-sk...

contract-review-anthropic

Review contracts against your organization's negotiation playbook, flagging deviations and generating redline suggestions. Use when reviewing vendor contracts, customer agreements, or any commercial agreement where you need clause-by-clause analysis against standard positions.

🇺🇸|EnglishTranslated
7
Security & Compliancemohitmishra786/low-level-...

binary-hardening

Binary hardening skill for security-hardened C/C++ builds. Use when enabling RELRO, PIE, stack canaries, FORTIFY_SOURCE, CFI sanitizers, shadow stack, or seccomp-bpf syscall filtering. Covers checksec analysis, compiler and linker flags for hardened builds, and NSA/CISA-recommended mitigations. Activates on queries about binary hardening, checksec, RELRO, PIE, stack canaries, FORTIFY_SOURCE, CFI, shadow stack, or seccomp.

🇺🇸|EnglishTranslated
7
Security & Complianceraroque/vibe-security-ski...

vibe-security

Audits codebases for common security vulnerabilities that AI coding assistants introduce in "vibe-coded" applications. Checks for exposed API keys, broken access control (Supabase RLS, Firebase rules), missing auth validation, client-side trust issues, insecure payment flows, and more. Use this skill whenever the user asks about security, wants a code review, mentions "vibe coding", or when you're writing or reviewing code that handles authentication, payments, database access, API keys, secrets, or user data — even if they don't explicitly mention security. Also trigger when the user says things like "is this safe?", "check my code", "audit this", "review for vulnerabilities", or "can someone hack this?".

🇺🇸|EnglishTranslated
7
Security & Compliancesickn33/antigravity-aweso...

007

Security audit, hardening, threat modeling (STRIDE/PASTA), Red/Blue Team, OWASP checks, code review, incident response, and infrastructure security for any project.

🇺🇸|EnglishTranslated
7
8 scripts/Attention
Security & Complianceruvnet/ruflo

agent-security-manager

Agent skill for security-manager - invoke with $agent-security-manager

🇺🇸|EnglishTranslated
7
Security & Compliancelawvable/awesome-legal-sk...

canned-responses-anthropic

Generate templated responses for common legal inquiries and identify when situations require individualized attention. Use when responding to routine legal questions — data subject requests, vendor inquiries, NDA requests, discovery holds — or when managing response templates.

🇺🇸|EnglishTranslated
6
Security & Compliancebinance/binance-skills-hu...

query-token-audit

Query token security audit to detect scams, honeypots, and malicious contracts before trading. Returns comprehensive security analysis including contract risks, trading risks, and scam detection. Use when users ask "is this token safe?", "check token security", "audit token", or before any swap.

🇺🇸|EnglishTranslated
6
Security & Compliancecaido/skills

caido-mode

Full Caido SDK integration for Claude Code. Search HTTP history, replay/edit requests, manage scopes/filters/environments, create findings, export curl commands, and control intercept - all via the official @caido/sdk-client. PAT auth recommended.

🇺🇸|EnglishTranslated
6
11 scripts/Checked
Security & Compliancekostja94/marketing-skills

brand-monitoring

When the user wants to monitor brand mentions, detect trademark infringement, or set up brand monitoring. Also use when the user mentions "brand monitoring," "brand watch," "trademark watch," "brand mentions," "impersonation detection," "counterfeit detection," or "brand abuse monitoring."

🇺🇸|EnglishTranslated
6
Security & Complianceanthropics/knowledge-work...

legal-response

Generate a response to a common legal inquiry using configured templates, with built-in escalation checks for situations that shouldn't use a templated reply. Use when responding to data subject requests, litigation hold notices, vendor legal questions, NDA requests from business teams, or subpoenas.

🇺🇸|EnglishTranslated
6
Security & Compliancevercel-labs/vercel-plugin

vercel-firewall

Vercel Firewall and security expert guidance. Use when configuring DDoS protection, WAF rules, rate limiting, bot filtering, IP allow/block lists, OWASP rulesets, Attack Challenge Mode, or any security configuration on the Vercel platform.

🇺🇸|EnglishTranslated
6
Security & Compliancemukul975/anthropic-cybers...

implementing-security-chaos-engineering

Implements security chaos engineering experiments that deliberately disable or degrade security controls to verify detection and response capabilities. Tests WAF bypass, firewall rule removal, log pipeline disruption, and EDR disablement scenarios using boto3 and subprocess. Use when validating SOC detection coverage and resilience.

🇺🇸|EnglishTranslated
6
1 scripts/Checked
1...2425262728...136
Page